Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/re/re15.bht:"
@article{DBLP:journals/re/AliDG10, author = {Raian Ali and Fabiano Dalpiaz and Paolo Giorgini}, title = {A goal-based framework for contextual requirements modeling and analysis}, journal = {Requir. Eng.}, volume = {15}, number = {4}, pages = {439--458}, year = {2010}, url = {https://doi.org/10.1007/s00766-010-0110-z}, doi = {10.1007/S00766-010-0110-Z}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/AliDG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/ArandaVP10, author = {Gabriela N. Aranda and Aurora Vizca{\'{\i}}no and Mario Piattini}, title = {A framework to improve communication during the requirements elicitation process in {GSD} projects}, journal = {Requir. Eng.}, volume = {15}, number = {4}, pages = {397--417}, year = {2010}, url = {https://doi.org/10.1007/s00766-010-0105-9}, doi = {10.1007/S00766-010-0105-9}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/re/ArandaVP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/DuboisM10, author = {Eric Dubois and Haralambos Mouratidis}, title = {Guest editorial: security requirements engineering: past, present and future}, journal = {Requir. Eng.}, volume = {15}, number = {1}, pages = {1--5}, year = {2010}, url = {https://doi.org/10.1007/s00766-009-0094-8}, doi = {10.1007/S00766-009-0094-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/DuboisM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/El-AttarM10, author = {Mohamed El{-}Attar and James Miller}, title = {Developing comprehensive acceptance tests from use cases and robustness diagrams}, journal = {Requir. Eng.}, volume = {15}, number = {3}, pages = {285--306}, year = {2010}, url = {https://doi.org/10.1007/s00766-009-0088-6}, doi = {10.1007/S00766-009-0088-6}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/El-AttarM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/ElahiYZ10, author = {Golnaz Elahi and Eric S. K. Yu and Nicola Zannone}, title = {A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities}, journal = {Requir. Eng.}, volume = {15}, number = {1}, pages = {41--62}, year = {2010}, url = {https://doi.org/10.1007/s00766-009-0090-z}, doi = {10.1007/S00766-009-0090-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/ElahiYZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/EsmaeilsabzaliDAN10, author = {Shahram Esmaeilsabzali and Nancy A. Day and Joanne M. Atlee and Jianwei Niu}, title = {Deconstructing the semantics of big-step modelling languages}, journal = {Requir. Eng.}, volume = {15}, number = {2}, pages = {235--265}, year = {2010}, url = {https://doi.org/10.1007/s00766-010-0102-z}, doi = {10.1007/S00766-010-0102-Z}, timestamp = {Tue, 25 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/EsmaeilsabzaliDAN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/FabianGHSS10, author = {Benjamin Fabian and Seda F. G{\"{u}}rses and Maritta Heisel and Thomas Santen and Holger Schmidt}, title = {A comparison of security requirements engineering methods}, journal = {Requir. Eng.}, volume = {15}, number = {1}, pages = {7--40}, year = {2010}, url = {https://doi.org/10.1007/s00766-009-0092-x}, doi = {10.1007/S00766-009-0092-X}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/FabianGHSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/FerrariMM10, author = {Remo Ferrari and James A. Miller and Nazim H. Madhavji}, title = {A controlled experiment to assess the impact of system architectures on new system requirements}, journal = {Requir. Eng.}, volume = {15}, number = {2}, pages = {215--233}, year = {2010}, url = {https://doi.org/10.1007/s00766-010-0099-3}, doi = {10.1007/S00766-010-0099-3}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/FerrariMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/Fuentes-FernandezGP10, author = {Rub{\'{e}}n Fuentes{-}Fern{\'{a}}ndez and Jorge J. G{\'{o}}mez{-}Sanz and Juan Pav{\'{o}}n}, title = {Understanding the human context in requirements elicitation}, journal = {Requir. Eng.}, volume = {15}, number = {3}, pages = {267--283}, year = {2010}, url = {https://doi.org/10.1007/s00766-009-0087-7}, doi = {10.1007/S00766-009-0087-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/Fuentes-FernandezGP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/HoumbIKJS10, author = {Siv Hilde Houmb and Shareeful Islam and Eric Knauss and Jan J{\"{u}}rjens and Kurt Schneider}, title = {Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec}, journal = {Requir. Eng.}, volume = {15}, number = {1}, pages = {63--93}, year = {2010}, url = {https://doi.org/10.1007/s00766-009-0093-9}, doi = {10.1007/S00766-009-0093-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/HoumbIKJS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/KaindlS10, author = {Hermann Kaindl and Davor Svetinovic}, title = {On confusion between requirements and their representations}, journal = {Requir. Eng.}, volume = {15}, number = {3}, pages = {307--311}, year = {2010}, url = {https://doi.org/10.1007/s00766-009-0095-7}, doi = {10.1007/S00766-009-0095-7}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/re/KaindlS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/LiABD10, author = {Chen Li and Marjan van den Akker and Sjaak Brinkkemper and Guido Diepen}, title = {An integrated approach for requirement selection and scheduling in software release planning}, journal = {Requir. Eng.}, volume = {15}, number = {4}, pages = {375--396}, year = {2010}, url = {https://doi.org/10.1007/s00766-010-0104-x}, doi = {10.1007/S00766-010-0104-X}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/re/LiABD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/MasseyOHA10, author = {Aaron K. Massey and Paul N. Otto and Lauren J. Hayward and Annie I. Ant{\'{o}}n}, title = {Evaluating existing security and privacy requirements for legal compliance}, journal = {Requir. Eng.}, volume = {15}, number = {1}, pages = {119--137}, year = {2010}, url = {https://doi.org/10.1007/s00766-009-0089-5}, doi = {10.1007/S00766-009-0089-5}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/re/MasseyOHA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/McElroyR10, author = {Jim McElroy and G{\"{u}}nther Ruhe}, title = {When-to-release decisions for features with time-dependent value functions}, journal = {Requir. Eng.}, volume = {15}, number = {3}, pages = {337--358}, year = {2010}, url = {https://doi.org/10.1007/s00766-010-0097-5}, doi = {10.1007/S00766-010-0097-5}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/McElroyR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/MoodyHM10, author = {Daniel Laurence Moody and Patrick Heymans and Raimundas Matulevicius}, title = {Visual syntax does matter: improving the cognitive effectiveness of the \emph{i}* visual notation}, journal = {Requir. Eng.}, volume = {15}, number = {2}, pages = {141--175}, year = {2010}, url = {https://doi.org/10.1007/s00766-010-0100-1}, doi = {10.1007/S00766-010-0100-1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/MoodyHM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/MussbacherWA10, author = {Gunter Mussbacher and Jon Whittle and Daniel Amyot}, title = {Modeling and detecting semantic-based interactions in aspect-oriented scenarios}, journal = {Requir. Eng.}, volume = {15}, number = {2}, pages = {197--214}, year = {2010}, url = {https://doi.org/10.1007/s00766-010-0098-4}, doi = {10.1007/S00766-010-0098-4}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/MussbacherWA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/NavarroLL10, author = {Israel Navarro and Nancy G. Leveson and Kristina Lundqvist}, title = {Semantic decoupling: reducing the impact of requirement changes}, journal = {Requir. Eng.}, volume = {15}, number = {4}, pages = {419--437}, year = {2010}, url = {https://doi.org/10.1007/s00766-010-0109-5}, doi = {10.1007/S00766-010-0109-5}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/NavarroLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/Ryan10, author = {Kevin Ryan}, title = {Introduction to the RE'09 special issue}, journal = {Requir. Eng.}, volume = {15}, number = {2}, pages = {139--140}, year = {2010}, url = {https://doi.org/10.1007/s00766-010-0106-8}, doi = {10.1007/S00766-010-0106-8}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/Ryan10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/SiveroniZS10, author = {Igor Siveroni and Andrea Zisman and George Spanoudakis}, title = {A UML-based static verification framework for security}, journal = {Requir. Eng.}, volume = {15}, number = {1}, pages = {95--118}, year = {2010}, url = {https://doi.org/10.1007/s00766-009-0091-y}, doi = {10.1007/S00766-009-0091-Y}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/SiveroniZS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/SundaramHDH10, author = {Senthil Karthikeyan Sundaram and Jane Huffman Hayes and Alex Dekhtyar and Elizabeth Ashlee Holbrook}, title = {Assessing traceability of software engineering artifacts}, journal = {Requir. Eng.}, volume = {15}, number = {3}, pages = {313--335}, year = {2010}, url = {https://doi.org/10.1007/s00766-009-0096-6}, doi = {10.1007/S00766-009-0096-6}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/SundaramHDH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/WhittleSBCB10, author = {Jon Whittle and Peter Sawyer and Nelly Bencomo and Betty H. C. Cheng and Jean{-}Michel Bruel}, title = {{RELAX:} a language to address uncertainty in self-adaptive systems requirement}, journal = {Requir. Eng.}, volume = {15}, number = {2}, pages = {177--196}, year = {2010}, url = {https://doi.org/10.1007/s00766-010-0101-0}, doi = {10.1007/S00766-010-0101-0}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/WhittleSBCB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/WolterM10, author = {Christian Wolter and Christoph Meinel}, title = {An approach to capture authorisation requirements in business processes}, journal = {Requir. Eng.}, volume = {15}, number = {4}, pages = {359--373}, year = {2010}, url = {https://doi.org/10.1007/s00766-010-0103-y}, doi = {10.1007/S00766-010-0103-Y}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/WolterM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.